Hiroshima University Syllabus

Back to syllabus main page
Japanese
Academic Year 2024Year School/Graduate School School of Informatics and Data Science
Lecture Code KA214001 Subject Classification Specialized Education
Subject Name 情報社会とセキュリティ
Subject Name
(Katakana)
ジョウホウシャカイトセキュリティ
Subject Name in
English
Information Society and Security
Instructor KITASUKA TERUAKI,NAKANISHI TOORU,MUKAIDANI HIROAKI,NISHIMURA KOUJI
Instructor
(Katakana)
キタスカ テルアキ,ナカニシ トオル,ムカイダニ ヒロアキ,ニシムラ コウジ
Campus Higashi-Hiroshima Semester/Term 3rd-Year,  First Semester,  2Term
Days, Periods, and Classrooms (2T) Tues1-4:ENG 107
Lesson Style Lecture Lesson Style
(More Details)
 
 
Credits 2.0 Class Hours/Week   Language of Instruction J : Japanese
Course Level 3 : Undergraduate High-Intermediate
Course Area(Area) 25 : Science and Technology
Course Area(Discipline) 02 : Information Science
Eligible Students
Keywords Information ethics, Information security, Information systems, Personal information, Cryptosystems, Intellectual property rights, Copyright 
Special Subject for Teacher Education   Special Subject  
Class Status
within Educational
Program
(Applicable only to targeted subjects for undergraduate students)
Learning the relationship between information technology and society. 
Criterion referenced
Evaluation
(Applicable only to targeted subjects for undergraduate students)
Computer Science Program
(Comprehensive Abilities)
・D2. Ability to derive optimal system solutions based on abundant cutting-edge information technologies for cross-sectoral issues in a diversified and complicated information society.

Data Science Program
(Comprehensive Abilities)
・D3. Ability to overlook social needs and issues that are intertwined in a complex manner and to solve issues with quantitative and logical thinking based on data, a multifaceted perspective, and advanced information analysis ability.

Intelligence Science Program
(Comprehensive Abilities)
・D3. Ability to grasp complexly intertwined social needs and issues from a bird's-eye view and solve issues with a multifaceted perspective and analytical ability based on a wide range of knowledge in intelligent science. 
Class Objectives
/Class Outline
To realize the influence and problems caused by information communication technology and the countermeasures, this class targets to learn information ethics, information security, social responsibility on information systems, protection of personal information, cryptosystems and their applications, intellectual property rights, and copyright. 
Class Schedule lesson 1 Information Ethics and Information Security
lesson 2 Case studies and Measures on Information Security
lesson 3 Information Security Management System
lesson 4 Cloud Services and Information Security Management
lesson 5 Strengthening Supply Chain Security in Mazda's Approach
lesson 6 Social Responsibility of Information Systems
lesson 7 Personal Information Handled by Information Systems
lesson 8 Protection and Utilization of Personal Information on Information Systems
lesson 9 Introduction to the Basics of Information Security and the Latest Case Studies
lesson10 Cyber Security and Technology in the Financial Industry - Case study
lesson11 CTF (capture the flag) Exercise
lesson12 CTF (capture the flag) Exercise
lesson13 Cryptography 1: Symmetric Key Encryption, MAC
lesson14 Cryptography 2: Public Key Encryption, Digital Signatures
lesson15 Cryptographic applications, Intellectual property rights, Copyright 
Text/Reference
Books,etc.
Handout 
PC or AV used in
Class,etc.
 
(More Details)  
Learning techniques to be incorporated  
Suggestions on
Preparation and
Review
Students should review each lesson.
 
Requirements  
Grading Method Evaluation based on exercises/small tests/reports. 
Practical Experience Experienced  
Summary of Practical Experience and Class Contents based on it The lecturer will instruct secure information systems based on software
development experience in an aeronautical system company and practical
experience as an information security engineer who has a license on
registered information security specialist.
Some of the lecturers are currently engaged in practical work related
to this course at companies, and will introduce examples of their
work. registered information security specialist. 
Message  
Other   
Please fill in the class improvement questionnaire which is carried out on all classes.
Instructors will reflect on your feedback and utilize the information for improving their teaching. 
Back to syllabus main page